JCPNet Tool and Automated Analysis of Distributed Systems ABSTRACT

合集下载

《公共建筑节能(绿色建筑)工程施工质量验收规范》DBJ50-234-2016

《公共建筑节能(绿色建筑)工程施工质量验收规范》DBJ50-234-2016
本规范共分 22 章和 13 个附录,主要内容包括:总则,术语,基本规定,墙体节能 工程,幕墙节能工程,门窗节能工程,屋面节能工程,地面节能工程,供暖节能工程, 通风与空调设备节能工程,空调与供暖系统冷热源节能工程,空调与供暖系统管网节能 工程,配电节能工程,照明节能工程,地源热泵系统节能工程,太阳能光热系统节能工 程,太阳能光伏节能工程,监测与控制节能工程,建筑环境工程,资源综合利用工程, 建筑节能(绿色建筑)工程现场实体检验,建筑节能(绿色建筑)工程质量验收。
( 7 ) 本 规 范 第 16.2.10 条 依 据 国 家 标 准 《 太 阳 能 供 热 采 暖 工 程 技 术 规 范 》 GB50495-2009 第 5.3.5 条的规定。
(8)本规范第 3.4.4 条为绿色建筑工程涉及的建筑环境与资源综合利用子分部工程 验收方式的规定。
本规范由重庆市城乡建设委员会负责管理,由重庆市建设技术发展中心(重庆市建 筑节能中心)、重庆市绿色建筑技术促进中心负责具体技术内容解释。在本规范的实施 过程中,希望各单位注意收集资料,总结经验,并将需要修改、补充的意见和有关资料 交重庆市建设技术发展中心(重庆市渝中区牛角沱上清寺路 69 号 7 楼,邮编:400015, 电话:023-63601374,传真:023-63861277),以便今后修订时参考。
建设部备案号: J13144-2015
DB
重庆市工程建设标准 DBJ50-234-2016Leabharlann 公共建筑节能(绿色建筑)工程
施工质量验收规范
Code for acceptance of energy efficient public building(green building) construction
(3)本规范第 1.0.4、3.1.2、11.2.4、22.0.6、22.0.7 条内容分别依据国家标准《建 筑节能工程施工质量验收规范》GB50411-2007 第 1.0.5、3.1.2 条、11.2.3、15.0.5、15.0.5 条等强制性条文要求。

毕设外文翻译讲解

毕设外文翻译讲解

衢州学院本科毕业设计(论文)外文翻译译文:实验室和现场的比较来确定土壤导热系数对能源基金会和其他地下换热器的影响收稿日期:2013年9月10日/接受日期:2014年4月28日在线/发布时间:2014年10月16日©施普林格科学+商业媒体有限责任公司2011年摘要:土壤热导热系数是影响能源基金会和其他地下换热器的一个重要因素。

它可以用现场热响应试验确定,这是昂贵又耗时的,但可以测试大量的土壤。

另外实验室测试法更便宜、更快可应用于较小的土壤样本。

本文研究了两种不同的实验方法:稳态热电池和瞬态探针。

从等会要进行热响应实验的现场采集一个U100土壤试样做一个小直径的测试桩。

试用两种实验室方法测试试样的导热系数。

热电池和探针测的结果明显不同,热电池法测得的导热系数始终高于探针法测得的。

热电池法的主要困难是确定热流率,因为测试设备有显着的热损失。

探针的误差少,但测试的试样比热电池的小。

然而,两种实验室方法得到的导热系数低比现场热响应试验的小得多。

对于存在这些差异的可能原因进行讨论,包括样本的大小,方向和外界干扰。

关键词:能源基金会,探针,热电池,导热系数1 介绍地源热泵系统(GSHP)提供了一个可行的替代传统的加热和冷却系统迈向可持续建筑的解决方案[6]。

热量由制冷剂的装置,它是通过一系列管道埋在地下的泵送在地面和建筑物之间传输。

为了尽量减少初期建设成本,管道可铸造成的基础,消除了需要进一步发掘。

这些系统被称为能量或热的基础。

要设计这样一个系统,它是精确模型的基础与土壤之间的热传递过程中的重要。

这种分析的一个重要的输入参数是土壤热导率。

有几种不同的实验室方法测量土壤热传导率[14,26]。

它们分为两类:稳态或瞬态方法。

在实验室规模,稳态方法涉及施加一个方向热流的试样,然后测量它的输入功率和温度差,当达到稳定状态。

的热导率,然后直接使用傅立叶定律计算。

瞬态方法包括将热施加到样品和监测温度随时间的变化。

自动化测试系统顶层设计方法论说明书

自动化测试系统顶层设计方法论说明书

Method of Top-level Design for Automated TestSystemsZhenjie Zeng1, Xiaofei Zhu1,*, Shiju Qi1, Kai Wu2 and Xiaowei Shen11Rocket Force University of Engineering, Xi’an, China2Troops No. 96604, Beijing, China*Corresponding authorAbstract—When designing an automatic test system, it is necessary to make each electronic test device conform to different test requirements. The most important issue is the system top-level design. The article starts with the three steps of the top-level design: system requirements analysis, architecture selection and analysis, and test equipment configuration. It describes in detail how to develop the top-level system design efficiently and reasonably when developing automated test systems. The principles, available method techniques, and precautions have some guiding significance for the top-level design of automated test systems.Keywords—automatic test system; top-level design; requirements analysis; architecture selection; test equipment configurationI.I NTRODUCTIONUsually, with a minimum of human involvement, a computer is used to execute a software program to control the test process and perform data processing until the test system that gives the test results in an appropriate manner is called ATS (Automatic Test System) or ATE (Automatic Test Equipment). .With the advancement of test bus technology, computer technology and software engineering technology, the difficultyof establishing ATS systems is also increasing. Due to the diversification of test objectives, there is no bus that can cover the needs of the entire automated test, coupled with the complexity and diversification of the test process and the function of the test instruments, making the establishment of modern automated test systems, especially the design of test software. The difficulty has doubled. How to effectively and rationally plan the test system architecture and select test equipment is a place that is not yet perfect, and therefore the top level design of the automatic test system is getting more and more attention.II.T OP-LEVEL D ESIGNAs the name suggests, the top-level design is the overall planning and design at the highest level. The top-level design of automatic test system integration is to stand at the level of past, present and future demands of the system under test, and to conduct overall planning and design from the perspective of technological development.The top-level design of automatic test system integration is based on sufficient requirements analysis, and comprehensively considers the optimal matching of technical and economic performances. It is advanced, practical, open, real-time, universal (compatibility), and reliability. , maintainability and other aspects of a comprehensive analysis, determine the test system architecture (including hardware platforms and software platforms), develop a corresponding test program. As shown in Figure 1, it is usually divided into three steps: requirements analysis, architecture selection and analysis, and test equipment configuration.AemandanalysisArchitectureselection andanalysisTest equipmentselection andconfigurationFunctional AnalysisTarget signal typeMeasured parameter definitionTestability analysisTest method analysisInterface bus analysisHardware architecture analysisController selection and analysisHardwareplatformSoftware operating environment analysisOperating system selection and analysisDevelopment platform selection and analysisDatabase selection and analysisTest instrument (module) selectionUTT interface connection designSpecial parameters require processingSoftwareplatformFIGURE I. AUTOMATIC TEST SYSTEM INTEGRATION TOP LEVELDESIGN FLOWIII.D EMAND A NALYSISTest requirement analysis is the basis of automatic test system integration top-level design. It mainly contains five aspects: functional requirements of the test target, test parameters, test objects, test methods, and test system planning.3rd International Conference on Electrical, Automation and Mechanical Engineering (EAME 2018)A.Test Target Functional RequirementsThe different requirements of the test equipment working platform determine the test speed requirements, and also determine the different requirements of the online/offline test; the main control method and logic of the tested equipment determines the difference between the test procedures and methods; the input frequency of the tested equipment, Different parameters, such as amplitude and modulation method, determine the overall requirements for the operating frequency band, small signal level (minimum leakage), and waveform parameters of the automatic test system analog signal source; the output and content of the device under test determines the signal sampling of the automatic test system. The data acquisition method is different; the digital communication interface of the device under test determines that the digital communication interface that the automatic test system should have is different from the protocol; the testability interface of the device under test determines the final test capability and fault diagnosis ability of the automatic test system.B.Test ParametersThe test parameter analysis includes analysis: the form of the measured parameter (electrical or non-electrical, digital or analog, etc.), range and quantity; performance index (measurement accuracy and speed, etc.); the form and range of the excitation signal. In particular, when analyzing requirements for a top-level design of a general-purpose comprehensive automatic test system that is suitable for multiple systems, multiple protocols, and multiple equipment, comprehensive analysis is often required to integrate the test parameters.C.Test ObjectThe test objects vary widely. When analyzing the test objects, a comprehensive analysis must be performed in conjunction with the test system requirements of the test objects. In the face of a specific test object test system or subsystem, the description can use a variety of expressions to give different models of the test system at different levels of simplification, such as language descriptions, graphics, and mathematical formulas. As a simplified description of some test systems, their models merely express their basic characteristics, often ignoring irrelevant details in order to simplify their complexity. For a complex test object test system, a model is inevitably limited by some assumptions in its design and utility. These conditions often have some ambiguity and basically reflect an implicit conceptual idea. Therefore, when analyzing the requirements of a specific test object, it is usually necessary to establish a corresponding test system model.D.Test MethodsAccording to the functional requirements of the test target, a corresponding test method is formulated for the “face-to-face automatic test system” or “object-oriented automatic test system”.. E.Test System PlanningWhen developing an automated test system, it often takes a lot of time to complete the test-assisted tasks such as creating files and programming supporting test software. The test application software development platform can standardize all kinds of test processes and integrate an operating system that is suitable for various test and post-processing functions. It can help us to complete these test auxiliary work; therefore, we use this kind of test platform to conduct various tests. When testing, you can save a lot of time.IV.A RCHITECTURE S ELECTION AND A NALYSIS On the basis of sufficient requirements analysis, determining the architecture of the automated test system is the most critical step in the top-level design. That is how to determine the test plan from the perspective of the top-level design, and select the hardware platform and software platform architecture of the automatic test system, and the most important one is the selection of the test equipment digital communication interface bus.A.System Test Plan SelectionThe system test plan is the overall concept of product testing. It specifies the type of product testing, when (continuous or regular) testing, where (field or workshop, or which maintenance level), testing methods, and test methods used. The types of system test can be divided into: system-wide test and departmental system test, static test and dynamic test, online test and offline test, quantitative test and qualitative test, continuous test and periodic test, etc. The test level can be divided into three levels according to the location: production site, use site, and maintenance base. The test system (equipment) operating methods are generally:According to the use of the operation can be divided into three kinds of automatic, semi-automatic and artificial; according to the general degree of application can be divided into two kinds of special and general equipment; according to the association with the product can be divided into two kinds of BITE and external test equipment.Most of the test methods used in automated testing have so far been modeled on manual tests, from the measurement principles used, the testing techniques used, to the test procedures performed, except that computers were used instead of manual operations. As far as the characteristics and potential of automatic testing are concerned, fundamental reforms of the test plan are needed for future research.B.Selection of Test Equipment Digital CommunicationInterface Bus and ATS StructureThe development of automatic test systems has promoted the continuous emergence of various general-purpose test equipment interface buses and rapid technological advancement: from the early GPIB, CAMAC to the recent VXI, MXI, PCI, PCIe, PXI, PXIe, cPCI, MMS, IEEE1394 ( Firewire), USB, etc. Although technical characteristics are not the same, they are widely used.The structural elements of a modern automated test system are programmable test instruments, test controllers, interconnected standard digital interfaces, and software systems. At present, modern automatic testing has been widely used, and the test objects faced are large, complex, and diversified, making it impossible for an automatic test system based on any kind of bus technology to cover the needs of the entire test object.Multi-bus fusion automatic test system structure shown in Figure 2. It consists of test instruments, DUTs(design under test) and UUT(unit under test) interfaces, test controllers (computers), various general-purpose digital interface buses, and test software. The test controller is interconnected with the test instrument through the digital interface bus, and the device under test is connected to the input/output terminal of the test instrument through the UUT interface. The digital interface bus used may be GPIB, VXI, PXI, LXI, or even an internal computer bus (AT/EISA/PCI), or their convergence. Once the standard digital interface bus architecture used is determined, the automatic test system architecture is basically selected. In an automatic test system, regardless of the interface bus architecture, an external computer or built-in computer system can be selected as the test system controller. The choice of the test system controller should fully consider the optimal matching of technical and economic performance, and choose from real-time, practical, reliable, flexible and convenient.CAT test hostMaster control computerGPIB instrument PC card typeinstrumentVXIinstrumentPXIinstrumentUUT interfaceUUT……FIGURE II. MULTI-BUS FUSION AUTOMATIC TEST SYSTEMSTRUCTUREC.Test Software Platform Mode SelectionIn modern computer-based automated test systems, hardware is the foundation and software is the soul. Test software has increasingly become the main body of ATS, which determines the advanced nature, reliability, practicality, and real-time performance of the entire automated test system.The automatic test software platform mainly refers to the programming language and software support environment involved in the test application software design. It is an integrated software platform such as a computer operating system, a test programming language, a database software, and a program diagnosis software. The key element is Test programming language. Since the automatic test system was popularized and applied, there have been great developments in testing programming languages from low-level to high-level, to the current test application development environment.V.T EST E QUIPMENT C ONFIGURATION After the system structure of the test system is determined, the next task is to synthesize the test contents according to the requirements analysis, and to match the corresponding test equipment according to the test content requirements. There are three types of optional test equipment: general test equipment, special purpose equipment, and test interface adapter.A.Universal Test EquipmentThe universal test equipment includes a main box, a test controller, a main control interface, a zero slot controller, an instrument module, and a desktop instrument. The following factors should be considered when selecting the type of equipment: (1) The higher the degree of equipment automation, the shorter the time for detecting and isolating faults, and the less the manpower consumption, but the cost of test equipment will increase and more protection is needed. (2) Differences in capabilities between the two are to be considered when selecting a BIT (Built-in-Test) and an off-board automatic test equipment. (3) When the BIT is used in conjunction with the off-board automatic test, make full use of the BIT capability of each unit under test. (4) When selecting a dedicated or general-purpose device, it is necessary to consider that the special-purpose device is simple and convenient to use and has high efficiency, but the use range is narrow. (5) The main selection of instrument and equipment is based on the requirements of test parameters, characteristics of the signal to be measured, and range selection. When selecting the instrument module, pay attention to the size of the bus module, power, and number of slots.B.Special Purpose EquipmentWhen the test is not ready for selection, in addition to the above-mentioned common tests, when preparing for the following situations, it may be considered to develop or develop special purpose instrument (module) equipment. When the current product can not meet the test requirements, multiple instruments and equipments are required to complete the measurement together. However, the utilization rate of each instrument is very low or can be accomplished with one instrument. When the price is high and the utilization rate is low, the use of development or development is considered. Special purpose instrument.C.Test Interface Adapter DesignFor different test objects, the extraction and feeding of various test signals requires the design and manufacture of various test interfaces and special fixtures. In the automatic test system, especially the automatic test system assembly of complex electronic equipment, the requirements of the same type but different models and different test objects existuniversally, and often require the test system group to build a relatively universal automatic test platform. Through this platform, different test modules and test methods can be used to quickly and easily complete the automatic test system set-up (configuration) task for different test objects; however, the test interface and the dedicated test module cannot be matched and can only be tested according to the device under test. The test requires the development of a test interface adapter.VI.C ONCLUSIONThis article starts with the three steps of the top-level design: system requirements analysis, architecture selection and analysis, and test equipment configuration. It describes in detail how to perform top-level design efficiently and reasonably when developing automated test systems, and analyzes what the design must follow. Principles, methods, techniques, and precautions have certain guiding significance for the top-level design of automated test systems.R EFERENCES[1]LI Xing-shan, ZUO Yi, SUN Jie. Automatic Test System IntegrationTechnology[M]. Publishing House of Electronics Industry, 2004.[2]QIN Hong-lei, LU Hui et al. Automatic Test System. Beijing: HigherEducation Press, 2007[3]LIU Si-jiu, ZHANG Li-yong. Automatic Test System and VirtualInstrument. Beijing: Publishing House of Electronics Industry, 2009 [4]GU Zhi-yong, TENG Peng, HU Shi-guo, et al. Top-level design of ATSoverall plan for integrated helicopter display systems[J]. Electro-optics and Control, 2008, 15(11):59-62.[5]GU Ya-ping. Research on Top Design of VXI Bus TestingTechnology[J]. Electronic Testing, 1998(8):22-23.。

CiteSpace中文手册

CiteSpace中文手册
4 文献的共被引分析—以恐怖主义研究为例............................................................................. 30 4.1 运行软件 ............................................................................................................................. 30 4.2 可视化结果 ......................................................................................................................... 31 4.3 布局调整 ............................................................................................................................. 31 4.4 共被引网络进行聚类 ......................................................................................................... 32 4.4 网络的调整 ......................................................................................................................... 32 4.5 文献共被引分析的原理 ..................................................................................................... 35 4.4 案例结果 ............................................................................................................................. 38

山东大学学报(工学版)总目次

山东大学学报(工学版)总目次

第6期第50卷总目次山东大学学报(工学版)第50卷2020 年总目次机器学习与数据挖掘基于域对抗网络和B E R T 的跨领域文本情感分析...............基于V i B e 算法运动特征的关键帧提取算法......................自适应属性选择的实体对齐方法.............................基于门控循环单元与主动学习的协同过滤推荐算法...........基于异质集成学习的虚假评论检测..........................一种使用并行交错采样进行超分辨的方法....................基于校正神经网络的视频追踪算法...........................基于改进Y O L O v 3的复杂场景车辆分类与跟踪..................基于混合决策的改进鸟群算法..............................一种基于深度神经网络的句法要素识别方法..................基于多维相似度和情感词扩充的相同产品特征识别...........符号序列的L D A 主题特征表示方法 .........................基于元图归一化相似性度量的实体推荐.......................基于Laplacian 支持向量机和序列信息的m i c r o R N A -结合残基预测 基于三维剪切波变换和B M 4D 的图像去噪方法................................蔡国永,林强,任凯琪(1-1)……李秋玲,邵宝民,赵磊,王振,姜雪(1-8)……苏佳林,王元卓,靳小龙,程学旗(1-14)......陈德蕾,王成,陈建伟,吴以茵(1-21)…张大鹏,刘雅军,张伟,沈芬,杨建盛(2-1)........................朱安,徐初(2-10)...........陈宁宁,赵建伟,周正华(2-17).............宋士奇,朴燕,蒋泽新(2-27)闫威,张达敏,张绘娟,辛梓芸,陈忠云(2-34)......陈艳平,冯丽,秦永彬,黄瑞章(2-44)...................胡龙茂,胡学钢(2-50).............冯超,徐鲲鹏,陈黎飞(2-60).............张文凯,禹可,吴晓非(2-66).....................马昕,王雪(2-76)......张胜男,王雷,常春红,郝本利(2-83)基于预测数据特征的空气质量预测方法...................................................................................................高铭壑,张莹,张蓉蓉,黄子豪,黄琳焱,李繁菀,张昕,王彦浩(2-91)基于轻型卷积神经网络的火焰检测方法..........................严云洋,杜晨锡,刘以安,高尚兵(2-100)基于深度学习的洗衣机异常音检测..........................李春阳,李楠,冯涛,王朱贺,马靖凯(2-108)语义分析及向量化大数据跨站脚本攻击智检.....................................张海军,陈映辉(2-118)自然语言问答中的语义关系识别.....................一种Chirplet 神经网络自动目标识别算法..............基于G a b o r 特征的乳腺肿瘤M R 图像分类识别模型......基于U A R T 串口的多机通讯.............................基于多模态子空间学习的语义标签生成方法.........基于背景复杂度自适应距离阈值修正的S u B S E N S E 算法基于双重启发式信息求解影响最大化问题的蚁群算法…联合检测的自适应融合目标跟踪.....................基于核极限学习机自编码器的标记分布学习.........基于集成学习〇,的质量浓度预测模型................基于空间注意力和卷积神经网络的视觉情感分析..............................段江丽,胡新(3-1)......................李怡霏,郭尊华(3-8).........袁高腾,刘毅慧,黄伟,胡兵(3-15).............................马金平(3-24)田楓,李欣,刘芳,李闯,孙小强,杜睿山(3-31)...............成科扬,孙爽,詹永照(3-38)•…覃俊,李蔚栋,易金莉,刘晶,马懋德(3-45)...............刘保成,朴燕,宋雪梅(3-51).......王一宾,李田力,程玉胜,钱坤(3-58)..................彭岩,冯婷婷,王洁(4-1)............蔡国永,贺歆灏,储阳阳(4-8)• 2 ■山东大学学报(工学版)第50卷一种基于多目标的容器云任务调度算法...............基于卷积神经网络的深度线段分类算法................基于类激活映射-注意力机制的图像描述方法...........基于Bi -LSTM 的脑电情绪识别.........................带特征指标约束描述的设计模式分类挖掘..............基于NRC 和多模态残差神经网络的肺部肿瘤良恶性分类中文对话理解中基于预训练的意图分类和槽填充联合模型融合残差块注意力机制和生成对抗网络的海马体分割••…........................谢晓兰,王琦(4-14)..............赵宁宁,唐雪嵩,赵鸣博(4-22).....廖南星,周世斌,张国鹏,程德强(4-28)..................刘帅,王磊,丁旭涛(4-35).....肖卓宇,何锫,陈果,徐运标,郭杰(6-48)■•…霍兵强,周涛,陆惠玲,董雅丽,刘珊(6-59)........................马常霞,张晨(6-68)张月芳,邓红霞,呼春香,钱冠宇,李海芳(6-76)控制科学与工程基于空间隐患分布与运动意图解析的危险评估方法........一类非仿射非线性大系统的结构在线扩展.................GPRS 监管的多协议异构现场总线控制系统................基于新型趋近律的参数未知分数阶Rucklidge 系统的滑模同步分数阶Brussel 系统混沌同步的三种控制方案...............一类非线性混沌系统的自适应滑模同步...................含对数项分数阶T 混沌系统的滑模同步...................赵越男,陈桂友,孙琛,卢宁,譽立伟(1 -28)............曹小洁,李小华,刘辉(1-35)……侯鹏飞,孙竹梅,王琦,白建云(1-49).........王春彦,邸金红,毛北行(4-40).........................程春蕊(4-46)..................程春蕊,毛北行(5-1)..................孟晓玲,毛北行(5-7)土木工程含层状节理岩体力学性质数值模拟研究.......................................徐子瑶,虞松,付强(3-66)水泥土搅拌桩沿海软基处理..............................................吕国仁,葛建东,肖海涛(3-73)高地应力下砂岩力学参数和波速变化规律试验研究..............................宫嘉辰,陈士海(3-82)饱和地基中单排孔近场隔振的现场试验与数值分析智慧公路关键技术发展综述...................双节理岩体T B M 滚刀破岩过程数值模拟......基于熵值法的水利施工企业绩效考核K P I 设计方法偏压大跨小净距公路隧道施工力学行为..........基于B P 神经网络算法的结构振动模态模糊控制••砂土介质中颗粒浆液扩散距离变化规律........预应力中空棒构件设计与力学特性..............隐伏溶洞对隧道围岩稳定性影响规律及处治技术硬岩隧道纯钢纤维混凝土管片应用..............喷扩锥台压灌桩最优构造.......................松散地层隧道进洞段管棚注浆加固效应分析……孙连勇,时刚,崔新壮,周明祥,王永军,纪方,闫小东(3-88)................................吴建清,宋修广(4-52)施雪松,管清正,王文扬,许振浩,林鹏,王孝特,刘洁(4-70).........................................程森(4-80)........................................王春国(4-85)...........................王志伟,葛楠,李春伟(5-13)........................冯啸,夏冲,王凤刚,张兵(5-20).............................林超,张程林,王勇(5-26).....................陈禹成,王朝阳,郭明,林鹏(5-33)..............徐振,李德明,王彬,詹谷益,张世杰(5-44)...........李连祥,邢宏侠,李金良,黄亨利,王雷(6-82)...................余俊,翁贤杰,樊文胜,张连震(6-92)机械与能动工程柔性Rushton 桨的振动特性.........................................................刘欣,杨锋茶(5-50)湿法脱硫塔一维传热传质性能模型理论与试验.....................陈保奎,孙奉仲,高明,史月涛(5-56)波浪能发电装置浮体形状参数对俘能性能影响............刘延俊,王伟,陈志,王冬海,王登帅,薛钢(6-1)深拖地震线列阵的动力学建模与位置预报...................朱向前,魏峥嵘,裴彦良,于凯本,宗乐(6-9)淹没深度对三自由度波能浮子获能的影响........................黄淑亭,翟晓宇,刘延俊,史宏达(6-17)尾缘襟翼振荡水翼的水动力特性.................................孙光,王勇,谢玉东,陈晨,张玉兵(6-23)深海带电插拔连接器力学特性分析…韩家桢,王勇,谢玉东,王启先,张新标,高文彬,李荣兰,张传军(6-30) 振荡翼改进运动模型的能量捕获性能分析............................乔凯,王启先,王勇,谢玉东(6-40)第6期第50卷总目次电气工程能源消费发展及预测方法综述..............................杨明,杜萍静,刘凤全,郝旭鹏,孛一凡(1-56)基于物理不可克隆函数的电网NB-IoT端到端安全加密方案............................................................................................刘冬兰,刘新,陈剑飞,王文婷,张昊,马雷,李冬(丨-63)中央空调紧急控制应对受端电网直流闭锁故障研究.................................................................................................刘萌,程定一,张文,张恒旭,李宽,张国辉,苏建军U-72)风电爬坡事件的非精确条件概率预测..........................王勃,汪步惟,杨明,赵元春,朱文立(丨-82)考虑同步调相机无功特性的多馈入直流同时换相失败风险评估方法............................................................................................麻常辉,王亮,谭邵卿,卢奕,马欢,赵康(3-98)考虑路灯充电桩接入的城市配电网电压控制方法............宋士瞻,陈浩宇,张健,王坤,郝庆水(3-104)基于分时电价的含光伏的智慧家庭能量调度方法…潘志远,刘超男,李宏伟,王婧,王威,刘静,郑鑫(3-111)基于弹性梯度下降算法的B P神经网络降雨径流预报模型..........金保明,卢光毅,王伟,杜伦阅(3-117)基于学习理论的含光储联合系统的输电网双层规划……孙东磊,赵龙,秦敬涛,韩学山,杨明,王明强(4-90) 考虑内部动态约束的MMC功率运行区间的确定及控制方法……张锋,杨桂兴,岳晨晶,郝全睿,李东(4 - 9 8)虾米腰弯管内置导流板优化...................................祁金胜,曹洪振,石岩,杜文静,王湛(5-64)基于B P神经网络的短期光伏集群功率区间预测........孙东磊,王艳,于一潇,韩学山,杨明,闰芳晴(5-70)偏心方圆节扩散管数值模拟.................................曹洪振,祁金胜,袁宝强,杜文静,王湛(5-77)烟气成分对湿式电除尘器电晕放电特性的影响.................王磊,张玉磊,李兆东,张金峰,王翔(5-83)含电极式电锅炉的地区电网电源侧综合效益分析......葛维春,李昭,赵东,李振宇,叶青,傅予,于娜(5-90)基于特征频带相电流提取的故障选相和选线方法........................张贺军,王鹏,徐凯,石访(5-99)电动汽车虚拟储能可用容量建模.......................................李蓓,赵松,谢志佳,牛萌(6-101)基于RTDS的配电网一二次融合仿真技术...............李志,余绍峰,苏毅方,王蔚,蒋宏图,张伟(6-112)芒刺参数对电晕放电及细颗粒物脱除特性的影响............................王磊,李明臻,王翔(6-118)含不凝气蒸汽在锯齿形表面的凝结传热特性............................闫吉庆,王效嘉,田茂诚(6-129)化学与环境济南城区大气PM2.5、PM,。

信息化项目软件开发费用测算指南4.0

信息化项目软件开发费用测算指南4.0
信息化项目软件开发费用测算指南 V4.0
重庆市首席信息官(CIO)协会 2源自17 年 10 月 1 日发布实施
本办法由重庆市首席信息官(CIO)协会 软件及信息化工程造价评估专委会 编制
重庆市首席信息官(CIO)协会 联系电话:023-67778659
目 次
前 言.............................................................................................................................................................. II 信息化项目软件开发费用测算指南....................................................................................................... - 1 1 范围..............................................................................................................................................- 1 2 术语和定义..................................................................................................................................- 1 3 软件开发成本构成..................................................................................................................... - 3 4 软件开发成本测算步骤............................................................................................................. - 4 附 录 A..............................................................................................................................................- 8 A.1 功能点计数项分类......................................................................................................... - 8 A.2 ILF 的识别...................................................................................................................... - 8 A.3 EIF 的识别...................................................................................................................... - 8 A.4 EI 的识别........................................................................................................................ - 8 A.5 E0 的识别........................................................................................................................ - 8 A.6 EQ 的识别........................................................................................................................ - 9 附 录 B............................................................................................................................................- 10 B.1 功能点分值计算方法................................................................................................... - 10 B.2 技术复杂度因子 TCF.................................................................................................... - 11 B.3 功能点耗时率............................................................................................................... - 11 B.4 软件因素调整因子(SWF)......................................................................................... - 11 B.5 开发因素调整因子(RDF)......................................................................................... - 13 B.6 各阶段开发工作量比例系数....................................................................................... - 13 B.7 人月费用....................................................................................................................... - 14 附 录 C............................................................................................................................................- 15 C.1 预估功能点计数表样例............................................................................................... - 15 C.2 估算功能点计数表样例............................................................................................... - 16 C.3 详细功能点清单列表................................................................................................... - 17 C.4 软件项目开发费用测算表样例................................................................................... - 18 C.5 开发软件需求书写规范样例....................................................................................... - 19 附 录 D............................................................................................................................................- 23 D.1 需求示意....................................................................................................................... - 23 D.2 测算规模....................................................................................................................... - 23 D.3 确定预算....................................................................................................................... - 24 -

计算机辅助危险与可操作性分析在苯乙烯装置中的应用

计算机辅助危险与可操作性分析在苯乙烯装置中的应用
关 系不大 的节 点 、 支路 去 除 。另 外 , 以将 一些 非 可
系统 内部 各 变量 的影 响关 系 。 当组装 成 总模 型后 ,
各个 子 系统 间 的影 响关 系开 始被 考 虑 。如果 在 测 试过 程 中 ,发现 有子 系 统 间的关 联关 系未正 确 表 达 时 , 要 在该 阶段 进行 进一 步 细化 和修 正 。 于 需 对
操作 性 分析 ( A — A O 。 C D H Z P)
图 1 建 模 过 程
11 熟 悉 流程 , . 划分 系统
第 一 阶段 工作 主 要 依 据 现 场 P I 图进 行 。 &D 将 系统 划 分 为相 对 比较 独 立 的几 个 子 系统 。并 要
求 工 程人 员 必 须 依 据物 质 流 、能 量 流 和信 息 流 3 个 方 面有 重 点地 分 析 。
建 的子 系统 进行推 理 ,查 看所 得到 的结论 并进 行
在 完 成总 装 测试 后 ,可 以利 用 C D H Z P A — AO 软 件 自动生 成报 表 。 2 苯 乙烯装 置 苯塔 系统 C — AP OP分 析 AD H Z
2 1 流程 表述 .
相 应 的修 正 。 是一 个 反复进 行 的过 程 , 每 一次 这 在
作者简介 : 郑建 , 工程师,96 19 年毕业于石油大 学( 5 ) 工机械 专 业 , 4 .化 现就 职 于 中 国石 化 齐 鲁分公 司塑料厂安全环保部 ,主要从事安全、 环 保技 术及 安 全 管理 工作 。
SAFE TY HEAL TH & ENVI RONMENT

.....
..
:...一 I. .. f.. . .
模 型拆分 、 细化 生成报告

基于行为分析的黑客攻击软件自动化分析工具的设计与实现

基于行为分析的黑客攻击软件自动化分析工具的设计与实现
LI He g , E W l— i g , AN e g S U n W N e p n W i Zh n —U
(Hale Waihona Puke e igU iest B in 0 6 0 C ia , kn nvri, e ig1 2 0 , hn ; P y j
2Hua Ist ef c ne n eho g o M t m ts uy n H n n 10 6C i ) . nn ntu o Si c adTcnl y f ah a c Yeag ua 440, hn it e o e i, a
o tt el tt n fs t ay i meh d e o r n r . r o l o d n mi n lss awa e u , h mi i so ai a lss t o sb c me mo e a d mo e He ei at o y a c a ay i M l r i ao t cn s t
Ab tat s r c :Stt n l i n y a i nay i r het o ai a ayssa d d n m c a l ssae t wo c mm o n l i t d n maw ae a lss c n a ayssmeho si l r nay i. W i hea t— e u ig, r g a p c r , o eo us ain, oymorhim n ra ss c tc noo e o ig t t n id b ggn p o r m a ke s c d bf c to p l h p s a dvaint u h e h lgisc m n
C d ae nk re c l aka dR g l x r s n , e n t t iS a a i i y n lz gt uak . s o eb sd en l al c eua E pe i sd mo s a ’ cp bl e b a i e j cs A o b n r so r et i s a y n hF t

网络信息安全英语练习题

网络信息安全英语练习题

网络信息安全英语练习题网络信息安全是现代社会中一个非常重要的议题,它涉及到保护数据不被未授权访问、修改、破坏或泄露。

以下是一些英语练习题,旨在帮助学生更好地理解和掌握网络信息安全的相关概念。

1. Multiple Choice Questions (选择题)Choose the correct answer from the options provided.a) What does "cybersecurity" refer to?- A) The study of cybernetics- B) The practice of protecting information systems from theft or damage- C) The design of computer networks- D) The creation of cyberspaceb) Which of the following is a common method used by hackers to gain unauthorized access to a system?- A) Social engineering- B) Social networking- C) Social media marketing- D) Social sciencec) What is a "firewall"?- A) A physical barrier to prevent fire from spreading- B) A software or hardware that monitors and controlsincoming and outgoing network traffic- C) A type of antivirus software- D) A network protocold) What is the purpose of "encryption" in cybersecurity?- A) To make data unreadable to unauthorized users- B) To increase the speed of data transmission- C) To reduce the size of data files- D) To improve the quality of network connections2. Fill in the Blanks (填空题)Fill in the blanks with the appropriate words from the list provided.- breach, protocol, phishing, malware, vulnerabilitya) A computer virus is a type of _______ that can cause damage to a system or steal information.b) An email that appears to be from a legitimate source butis actually designed to trick the recipient into revealing sensitive information is known as _______.c) A _______ is a set of rules governing the format and transmission of data over a network.d) A _______ in a system is a weakness that can be exploited by an attacker.e) A _______ of data security occurs when unauthorized accessis gained, often resulting in data loss or corruption.3. True or False (判断题)Determine whether the statements below are true or false.a) Two-factor authentication is a security measure that requires two different methods of verification to access a system. (True / False)b) Public Wi-Fi networks are always secure and safe to usefor online banking. (True / False)c) A strong password should include a mix of upper and lower case letters, numbers, and special characters. (True / False)d) It is not necessary to update software regularly because updates are only for new features. (True / False)e) VPNs (Virtual Private Networks) can provide an extra layer of security by encrypting internet traffic. (True / False)4. Short Answer Questions (简答题)Answer the following questions in a few sentences.a) What is the significance of using strong passwords?b) Explain the concept of "zero-day" vulnerabilities.c) How can users protect themselves from phishing attacks?d) What are some best practices for maintaining network security at home?e) Describe the role of a cybersecurity analyst.These exercises are designed to test and reinforce knowledge on various aspects of network information security. By practicing with these questions, students can enhance their understanding of the subject and be better prepared to tackle real-world cybersecurity challenges.。

基于因果发现的神经网络集成方法

基于因果发现的神经网络集成方法

基于因果发现的神经网络集成方法
凌锦江;周志华
【期刊名称】《软件学报》
【年(卷),期】2004(015)010
【摘要】现有的神经网络集成方法主要通过扰动训练数据来产生精确且差异度较大的个体网络,从而获得较强的泛化能力.利用因果发现技术,在取样结果中找出类别属性的祖先属性,然后使用仅包含这些属性的数据生成个体网络,从而有效地将扰动训练数据与扰动输入属性结合起来,以产生精确度高且差异度大的个体.实验结果表明,该方法的泛化能力与当前一些流行的集成方法相当或更好.
【总页数】6页(P1479-1484)
【作者】凌锦江;周志华
【作者单位】南京大学,计算机软件新技术国家重点实验室,江苏,南京,210093;南京大学,计算机软件新技术国家重点实验室,江苏,南京,210093
【正文语种】中文
【中图分类】TP18
【相关文献】
1.基于因果强度的时序因果关系发现算法 [J], 郝志峰;谢蔚涛;蔡瑞初;王丽娟;洪英汉
2.一种基于因果强度的局部因果结构主动学习方法 [J], 周冬梅;王浩;姚宏亮;李俊照;张赞
3.因果律及其发现的方法 [J], 禄存义
4.基于多组典型相关变量的因果关系发现算法 [J], 陈薇;蔡瑞初;伍运金;谢峰;郝志峰
5.基于因果关系发现的关键化学组分辨识方法 [J], 董雁适
因版权原因,仅展示原文概要,查看原文内容请购买。

用于改善计算机断层扫描中的空间分辨率的系统和方法[发明专利]

用于改善计算机断层扫描中的空间分辨率的系统和方法[发明专利]

专利名称:用于改善计算机断层扫描中的空间分辨率的系统和方法
专利类型:发明专利
发明人:金燕南,范家华,吴明烨,陈峰,布鲁诺·克里斯蒂安·伯纳德·德曼
申请号:CN201910040575.9
申请日:20190116
公开号:CN110047114A
公开日:
20190723
专利内容由知识产权出版社提供
摘要:本发明方法涉及在计算机断层扫描背景下避免方位角模糊,诸如在具有快速kV切换的双能量成像中。

根据某些方面,在每个对应视图内,焦斑位置在患者坐标系中保持静止,并且对所述视图内的检测器信号进行相加。

在一个实施例中,这产生了从患者坐标系内的同一位置处收集的信号内的低能量视图和高能量视图。

申请人:通用电气公司
地址:美国纽约州
国籍:US
代理机构:上海专利商标事务所有限公司
更多信息请下载全文后查看。

计算机辅助软件开发在现代计算机教学中的应用分析

计算机辅助软件开发在现代计算机教学中的应用分析

计算机辅助软件开发在现代计算机教学中的应用分析发表时间:2020-12-04T15:53:28.950Z 来源:《教学与研究》2020年第24期作者:冯焕婷[导读] 计算机辅助软件开发在现代计算机教学中的应用有效地提高了我国计算冯焕婷成都文理学院四川省成都市 610401摘要:计算机辅助软件开发在现代计算机教学中的应用有效地提高了我国计算机教学的整体质量和水平,让计算机教学可以更好地发挥出自己的作用,提高学生的计算机水平和计算机素养,为我国学生的学习提供了帮助。

本文首先简要的分析了计算机辅助软件开发在现代计算机教学中的应用的意义,然后从三个方面出发阐述了计算机辅助软件开发在现代计算机教学中的应用方式,以此来供相关人士的交流参考。

关键词:计算机辅助软件开发;计算机教学;应用方式引言:计算机辅助软件开发在现在计算机教学中的应用是我国计算机教学发展与进步的一个重要的表现,同时也是我国现代计算机教学发展与前进道路上的推动力量。

时代是在不断地发展与进步的,现如今,计算机技术已经被运用到了社会的各个方面之中,计算机教育在现代教育中的地位越来越高,计算机辅助软件开发也有效地提高了我国计算机教育的整体水平。

一、计算机辅助软件开发在现代计算机教学中的应用的意义现阶段,我国已逐步迈入了信息化的时代,信息技术被运用到了社会的各个方面之中,对社会的发展产生了极为重要的影响,计算机技术作为信息技术的一个重要的组成部分,其发展与进步也有效地促进了我国社会的发展与进步。

提高现代计算机教学的整体质量和水平是推动我国现代社会发展的一个重要的方式和途径,也是我国现代社会发展与前进道路上的必修之路。

计算机辅助教学在一定程度上使得其教学的层次和教学的内容在纵向的方面深入地发展,现代社会的计算机教学过程中,以图形化方式为主的计算机辅助教学得到了有效的普及,尤其是多媒体技术的运用,在一定程度上弥补了传统的计算机教学中所存在的问题与不足,提高了计算机教学的科技性[1]。

计算机辅助药物设计_暨南大学中国大学mooc课后章节答案期末考试题库2023年

计算机辅助药物设计_暨南大学中国大学mooc课后章节答案期末考试题库2023年

计算机辅助药物设计_暨南大学中国大学mooc课后章节答案期末考试题库2023年1.计算机辅助药物设计的英文简称是什么答案:CADD2.如果没有蛋白质的晶体结构,需要同源模建,可以使用答案:Sybyl3.地西泮不具有下列哪项作用答案:抗焦虑作用4.以下哪一个药物不属于非甾体类抗炎药物。

答案:地塞米松5.分子对接分类中适合处理大分子和小分子间对接的是答案:半柔性对接6.分子对接分类中一般用于精确考虑分子间的识别情况的是答案:柔性对接7.通过受体的特征以及受体和药物分子之间的相互作用方式来进行药物设计的方法答案:分子对接8.分子对接属于什么领域答案:药物设计9.分子对接最初思想起源于FisherE.的答案:锁和钥匙模型10.蛋白质-配体相互作用的效果可以在一定程度上由()表示答案:配体效率11.在体外培养细菌18~24小时后能一直培养基内病原菌生长的最低药物浓度,是答案:MIC12.能引起50%的实验动物出现阳性反应时的药物剂量,是答案:ED5013.能使一群动物在接触外源化学物一定时间(一般固定为2~4小时)后并在一定观察期限内(一般为14小时)死亡50%所需的浓度,是答案:LC5014.活性被抑制50%时抑制剂的浓度答案:MIC15.同源模建的基本流程大致可分为6步。

第一步是答案:同源蛋白的搜索16.蛋白结构保守区是指在生物进化或者一个蛋白家族中(),他们一般具有重要的功能。

答案:具有不变或相同的结构域17.同源模建的可行性在于:同源蛋白是由()由同一祖先蛋白趋异进化而产生的蛋白质。

答案:两个或两个以上18.序列比对实际上是根据特定数学模型找出序列之间最大匹配()。

答案:残基数19.同源建模模型评价的方法不包括()答案:平面化学20.通常在某些位点上有一些氨基酸被另外一些化学物理特性相近的氨基酸所代替,这种突变可称为()答案:保守突变21.()是把结构未知的蛋白质序列与已知的结构进行匹配,找出一种或几种匹配结构好的结构作为结构未知的蛋白质的预测结构。

基于代码驱动的词法分析器的改进

基于代码驱动的词法分析器的改进

基于代码驱动的词法分析器的改进
张全伙
【期刊名称】《华侨大学学报:自然科学版》
【年(卷),期】1998(019)003
【摘要】介绍两种基本的词法分析器的实现,就代码驱动的记号法分析器的不足之处提出改进方法,并用PASCAL语言给出了实现的程序段。

【总页数】6页(P323-328)
【作者】张全伙
【作者单位】华侨大学计算机科学系
【正文语种】中文
【中图分类】TP314
【相关文献】
1.程序代码相似度度量中词法分析器的设计实现 [J], 于海英
2.基于改进代码分发协议的远程代码更新技术研究 [J], 高菲
3.基于 RTW 的驱动代码快速生成技术研究 [J], 冯辉宗;朱澎;蒋建春
4.基于驱动代码分离的设备驱动体系结构的研究 [J], 白璐
5.气象代码的应用现状及向表格驱动代码过渡的影响分析 [J], 赵芳
因版权原因,仅展示原文概要,查看原文内容请购买。

基于本体映射的产品配置模型自动获取

基于本体映射的产品配置模型自动获取

基于本体映射的产品配置模型自动获取高鹏;林兰芬;蔡铭;董金祥【期刊名称】《计算机集成制造系统》【年(卷),期】2003(009)009【摘要】在研究和分析现有用户需求理解方法的不足的基础上,提出了一种基于本体映射的用户需求知识向产品配置知识自动转换的方法.讨论了用户需求本体和产品配置本体,给出了基于本体的用户需求模型和产品配置模型,建立了本体映射规则,提出了以本体映射、知识映射、模型映射三层映射模式为核心的产品配置模型建模框架,并给出了产品配置模型获取算法.【总页数】7页(P810-816)【作者】高鹏;林兰芬;蔡铭;董金祥【作者单位】浙江大学CAD&CG国家重点实验室,浙江,杭州,310027;浙江大学人工智能研究所,浙江,杭州,310027;浙江大学CAD&CG国家重点实验室,浙江,杭州,310027;浙江大学人工智能研究所,浙江,杭州,310027;浙江大学CAD&CG国家重点实验室,浙江,杭州,310027;浙江大学人工智能研究所,浙江,杭州,310027;浙江大学CAD&CG国家重点实验室,浙江,杭州,310027;浙江大学人工智能研究所,浙江,杭州,310027【正文语种】中文【中图分类】TP16【相关文献】1.基于本体映射的需求相似度产品配置研究 [J], 杨沁;武珂;唐伟;卫道柱2.基于FPBS的工程机械产品结构配置模型的建立 [J], 陈科恒3.基于变型空间FBS本体映射的产品创新设计方法 [J], 陈继文;杨红娟;张进生;王志4.基于本体映射面向模糊客户需求的产品配置研究 [J], 但斌;姚玲;经有国;张旭梅5.基于QFD的多目标产品配置模型及配置优化研究 [J], 詹钧凯;石宇强;夏世洪;陈柏志;朱智鹏因版权原因,仅展示原文概要,查看原文内容请购买。

层次分析法在计算机联网技术中的应用

层次分析法在计算机联网技术中的应用

层次分析法在计算机联网技术中的应用
卢加元;常本康
【期刊名称】《南京理工大学学报(自然科学版)》
【年(卷),期】2003(027)006
【摘要】对当前计算机联网的几种主要技术按层次进行分解细化,确定评价因素的权重,建立一个计算机联网技术选型的数学模型,通过对权重的分析得到利用帧中继(FR)技术组建计算机网络具有最好的性能/价格比的结论,这对农村信用合作联社计算机网络系统的构建具有很好的指导意义.
【总页数】4页(P705-708)
【作者】卢加元;常本康
【作者单位】南京理工大学电子工程与光电技术学院,南京,210094;南京理工大学电子工程与光电技术学院,南京,210094
【正文语种】中文
【中图分类】TJ012
【相关文献】
1.层次分析法在计算机联网技术中的应用 [J], 刘长青
2.层次分析法在计算机联网技术中的应用 [J], 卢加元;常本康
3.层次分析法在计算机联网技术中的应用 [J], 王坤
4.层次分析法在计算机联网技术中的应用探讨 [J], 王强;
5.层次分析法在计算机联网技术中的应用 [J], 朱百合
因版权原因,仅展示原文概要,查看原文内容请购买。

取代基对苯腈类低聚物几何及电子特征的影响(英文)

取代基对苯腈类低聚物几何及电子特征的影响(英文)

取代基对苯腈类低聚物几何及电子特征的影响(英文)
侯廷军;李有勇;何元康;陈慧英;徐筱杰
【期刊名称】《物理化学学报》
【年(卷),期】2000(16)10
【摘要】用半经验量化计算研究了一系列苯腈类低聚合物的几何结构及其电子特征 .苯腈类低聚合物几何结构的计算采用半经验量子化学计算和分子力学构象分析相结合的方法,而电子特征则的计算采用 ZINDO/S-CI方法 .取代基包括甲氧基、甲基、羟基、氨基、氟和硝基 .它们在苯环上可以采用邻位、间位和对位三个取代位置 .计算结果表明,不同的基团在苯环上采用不同的取代位置时,低聚物的构象会存在一定的差别,而且电性会随着基团的得失电子能力和取代位置呈现出有规律的变化 .
【总页数】6页(P886-891)
【关键词】苯腈类低聚物;半经验量子化学计算;几何结构
【作者】侯廷军;李有勇;何元康;陈慧英;徐筱杰
【作者单位】北京大学化学与分子工程学院
【正文语种】中文
【中图分类】O631.1;O641.121
【相关文献】
1.聚对苯撑齐聚物的中性态和掺杂态的几何结构特征 [J], 刘德胜;郑斌;王鹿霞;解士杰;梅良模
2.不同取代基对苯系物三维荧光光谱特征的影响 [J], 王碧;席宏波;周岳溪;陈学民;伏小勇
3.取代基电子效应对聚苯并噁嗪热稳定性影响研究 [J], 朱永飞;顾宜
4.邻苯二甲腈预聚物对聚芳醚腈的增塑行为与性能研究 [J], 钟家春;陈文瑾;刘孝波
5.单体配比对聚苯硫醚低聚物合成的影响 [J], 苗国祥;匡莉
因版权原因,仅展示原文概要,查看原文内容请购买。

智慧树答案计算机辅助工程分析知到课后答案章节测试2022年

智慧树答案计算机辅助工程分析知到课后答案章节测试2022年

第一章1.通过计算机辅助工程设计和分析,可以缩短机械产品的设计周期,节省设计费用。

()答案:对2.一维杆单元的变形特征类似于弹簧,其弹簧刚度k是()。

答案:EA/L3.CAE的技术种类有:()。

答案:边界元法();有限元法();有限差分法4.广义来讲,CAE就是有关产品设计、制造、工程分析、仿真、实验及信息分析处理,以及相应数据库和数据库管理系统在内的计算机辅助设计和生产的综合系统。

()答案:对5.有限元是近似求解一般连续域问题的数值方法。

()答案:对第二章1.ANSYS主要用于结构的静力学分析,不能进行多物理场分析。

()答案:错2.CAE仿真分析最重要的是建模和网格划分。

()答案:错3.采用单位制mm-t-s建模时,密度为7850kg/m3在分析中应输入密度的数值为()答案:7.85e-94.采用单位制m-kg-s建模时,材料弹性模量为2e5MPa在分析中应输入弹性模量的数值为()答案:2e115.单元是由节点构成的,一个单元可以包含1个或多个节点。

()答案:对第三章1.ANSYS中创建圆弧倒角线,可通过下述哪一种操作路径实现?()答案:Preprocessor>Modelling>Create>Line>Line fillet2.删除面时,只删除指定的面,保留这个面所包含的低阶图元,应采取的操作路径是()。

答案:Main Menu>Preprocessor>Modeling>Delete>AreasOnly3.实体建模中的基本图元有()。

答案:线;关键点;体;面4.建立实体模型时,关键点是最小的图元对象。

()答案:对5.在ANSYS中,选择“线”的GUI操作是:Utility Menu |Select |Entities命令,弹出实体选择对话框,在选择对象下拉列表中选择Lines选项即可。

()答案:对第四章1.在后处理中,第一步是将数据结果读入数据库当中,执行的菜单路径是()。

答案:Utility Menu>File>Resume Jobname.db2.时间后处理Post26可用于检查什么?()。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

JCPNet Tool and Automated Analysis ofDistributed SystemsXiaochuan Yi and Krys J. KochutDepartment of Computer ScienceThe University of GeorgiaAthens, GA 30602-740101-706-5830613{xyi, kochut}@ABSTRACTModel based approach is crucial to the analysis of system design. Colored Petri Nets (CPNet) have been used as software model with good success. It can be used to complement UML diagrams by providing formal modeling and analysis of dynamic behaviors of distributed systems. In order to enable CPNet model to be utilized more flexibly and widely, a new software tool JCPNet has been developed. This paper discusses the background, motivation and development of JCPNet, and its applications to specification and analysis of distributed systems.Categories and Subject DescriptorsCategories and Subject Descriptors: D.2 [Software]: Software Engineering - Design Tools and Techniques; Petri nets; G.4 [Mathematics of Computing]: Mathematical Software - Algorithm design and analysis; verification;General TermsAlgorithms, Theory, VerificationKeywordsColored Petri Nets, State space, Occurrence graph, Service-Oriented Architecture, Service composition1.INTRODUCTIONSystem models provide abstractions of a physical system that allow engineers to reason about the system. All forms of engineering rely on models to understand complicated systems. The uses of models include predicting system qualities, reasoning about specific properties when aspects of the system are changed, and communicating key system characteristics among various stakeholders. System models can be developed as a precursor to implementation of the physical system, or they can be derived from an existing system as an aid to understanding its behavior [Intro to MDA].A major advantage of formal modeling is that it allow for formal reasoning. All state-based formal reasoning techniques involve examining every possible state of a system. Such techniques are automatic, thus they can be applied by less trained personnel, for analysis and error detection as well as verification. Therefore they are one of the most promising formal reasoning techniques [Incremental state space].Colored Petri Nets model (CPNet) [Jensen v1] [CPN practioner’s guide] is a high-level Petri net extended with token color, time and hierarchy. It is a graphical formalism suitable for modeling systems where concurrency, synchronization, and communication are key characteristics. CPNets and Petri nets have already been applied successfully to communication protocols, data networks, embedded systems, business process/workflow modeling, and manufacturing systems. Moreover, the use of CPNets spans over many phases of system development ranging from requirements elicitation to design, validation, and implementation [CPN sys dev]. The primary reason for the success of CPNets is because CPNet has a graphical representation, a well-defined semantics allowing formal analysis, and supporting software tools such as CPN Tools [CPN Tools].In our research project on “Specification, Design and Analysis of Service-Oriented Distributed Systems” [atpn], we focus on research issues regarding service composition involving statefulpartner services, such as specification of behavioral interfaces (also called conversation protocols) and compositions. Our underlying specification model is based on CPNet. In certain situations the conversation protocol of a composite service is not easily known before the composition is finished. Therefore we have devised an algorithm that derives the conversation protocol from the corresponding composition automatically. The derivation algorithm is based on a series of CPNet occurrence graph constructions. Unfortunately, the source code of CPNet occurrence graph construction algorithm is not available, which motivates us to create our own data structures representing CPNet model and implement core CPNet algorithms.In order to enable CPNet to be more widely and easily used, the programming language used for CPNet data structures and algorithms must be a widely used programming language. The programming language should also support convenient GUI development and XML processing, so that CPNet models can be efficiently visualized and exchanged in XML documents. Initially C++ had been considered due to the execution speed of compiled C++ programs. Eventually we have turned to Java because class reflection mechanism is provided by Java and its data structures are more flexible. These features are keys to efficient representation of CPNet.CPNet model incorporates certain capabilities of programming language for richer data manipulation, which have enhanced the expressiveness of CPNet model and reduced the model size considerably compared to standard Petri Net [Muruta 89]. The programming language adopted in CPNet is CPN-ML, an extension of function programming language Standard ML [SML]. CPNet elements such as color sets, token variables, arc expressions, transition guard expressions are specified in CPN-ML. Our contention is that the programming language incorporated in CP-net model specification should NOT be confined to one particular language such as SML. Java is one of the most used programming languages; it is platform independent; it provides SDK for efficient GUI development and powerful XML processing. Last but not least, Java is expressive enough to specify CPNet inscriptions as well.Currently the source code of CPNet data structure and algorithms is not freely available in a commonly used programming language such as Java or C++. By providing the CPNet data structure and algorithms in Java, we hope more researchers and programmers will get a chance to look at CPNet model and actually use it. Furthermore, basic CPNet data structures and algorithms can be integrated as APIs, which is more flexible than solely replying on external tools such as CPN tools.Driven by the above motivations, we have developed a new tool supporting CPNet called JCPNet. JCPNet provides a general representation of CPNet model in Java classes and the implementation of a collection of common CPNet algorithms such as occurrence graph construction algorithm [Jensen v2]. Occurrence graph is also known as reachability graph or state space. JCPNet also provides a bundle of example applications: arithmetic adder, dining philosophers, distributed database, resource allocation, and specification and analysis of service oriented distributed systems.The paper is organized as follows: in Section 2 firstly we describe concepts and definitions regarding CPNet, secondly we present an overview of key data structures and algorithms in JCPNet, as well as their relationships to corresponding CPNet concepts. In Section 3, we discuss the importance of state space analysis and CPNet occurrence graph construction algorithm. In Section 4, we present several examples to show the application of JCPNet to distributed systems modeling and analysis. Finally, Section 5 contains concluding remarks and discussion of future direction.2.DATA STRUCTURES FOR CPNET2.1Informal Description of CPNet Structure and BehaviorIn this section, we give an informal description of concepts regarding CPNet structure and behavior. The description is helpful to understand the formal definition of CPNet and our implementation of JCPNet. Readers who are interested in the formal definition of CPNet structure and behavior should refer to [Jensen v1].CPNet is a directed bipartite graph, which has two different types of nodes (vertices): place and transition. An arc (edge) connects from a place to a transition; or from a transition to a place. Data manipulation in CPNets is supported by CPN-ML, which is an extension of Standard ML. A CPNet has a declaration of data types (called color sets), token variables, constant values and functions in CPN-ML. A token variable can be bound to an element of the color set which the variable belongs to. A token is defined as an element of a particular color set. A token variable bound to a value is a token. Furthermore, the declared variables, constants and functions are used to construct CPN-ML expressions, which are used to inscribe places, transitions and arcs of theCPNet. Each place p is mapped to a color set C(p), and p contains a collection of tokens which is a multi-set over C(p). The state of p containing tokens is called a marking of p. The distribution of various tokens all over the places in a CPNet is called a marking of the CPNet. An arc is inscribed with an expression, which evaluates to a multi-set over the color set of its input place when all the variables in the expression are bound to values. A transition has a boolean expression called guard. The collection of variables which occur in the input arc expressions and the guard expression is called the variables of the transition. The pairing (t,b) of a transition t and a binding b of the variables of t is called a binding element. A binding element (or transition t) is enabled when each input place of t contains enough tokens the input arc expression “asks for”. An enabled transition may fire. When the transition fires, firstly the tokens in each input place are consumed according to the input arc expression, secondly new tokens are added to each output place according to the output arc expression. The firing of a transition is deemed as an atomic event, there is no interim marking corresponding to the state when the input tokens have been consumed and output tokens have not yet added to output places.2.2Class Diagram of JCPNetThe UML Class Diagram of JCPNet is shown in Fig. 1, which presents an overview of data structures representing CPNet. With the class diagram, now we describe each class in details. Please note the term “attribute” in UML has the same meaning as the term “class field” in Java, and the term “operation” has the same meaning as the term “class method” in Java.Class DeclarationAn object of class Declaration realizes the declaration of color sets, token variables, constant values, and expressions that will be used in the CPNet. Declaration is an abstract class, it must be extended for each specific CPNet.Sometimes, token variables from different input arcs of a transition are not independent of each other. For example, in the CP-net of Distributed Database (see Fig. x), transition receive has two input token variables: r and mes (mes is pair of (s, r)), and any binding applied to transition receive should always keep r equal to the r of mes. Operation match ( ) method can be override to enforce such a specific constraint when necessary.Class NodeCPNet is essentially a directed bipartite graph which contains two different types of nodes: places and transitions. However, a place and a transition still share some common attributes, which is captured by class Node to encourage reuse.Class Place extends NodeAttribute currentMarking represents the current marking of the place, while attribute initialMarking represents the initial marking of the place. Operation Place ( ) is the constructor of class Place.Fig .1. UML Class Diagram for JCPNetClass Transition extends NodeThe attributes vars represents the set of variables of the transition, including any variable which occurs in the guard expression and any input arc expressions of the transition. Even though the information attribute vars carries is implied by the guard expression and input arc expressions, we insist attribute vars should be specified explicitly for simplicity and efficiency purposes. Usually vars is a very small set.Each token variable can be bound to any token in the corresponding input place. Operation getBindings ( ) generate the all possible combinations of variable bindings. Operation isEnabled ( ) indicates whether the transition is enabled with a binding of vars. If any input token is time stamped and the time stamp has not reached the current time, then even the transition is enabled, it is not yet ready to fire. Operation isReady ( ) indicates the readiness of the transition. When a transition is enabled and ready, it can be fired. The firing of the transition will consume tokens from each input place according to the binding and input arc inscriptions, and generate tokens according to binding and the output arc inscriptions then add tokens into each output place.Class ArcAn arc connects its source node to its target node. A node is either a place or a transition. The source node and target node of an Arc should never be of the same type. Otherwise an IllegalArcException will be thrown.Class CPNetAttribute places represents the finite set of places, while Attribute transitions represents the finite set of transitions. Operation getOGraph ( ) constructs the occurrence graph of the CPNet with the current marking. Operation getPlaceByLabel ( ) and getTransitionByLabel ( ) are used to retrieve the reference of a place or transition by its label. Operation print ( ) display the structure of the CPNet. Operation printMarking ( ) is a static method used to display the content of a particular marking of the CPNet.Class OGraphNode extends NodeEach node of an occurrence graph represents a reachable marking from the initial marking of the CPNet. Attribute id is used to refer to a node for convenience reasons. In depth-first search of graphs [algorithm text], nodes are colored to indicate their state during the search. Each node is initially white. It is grayed once upon it has been discovered in the search, then it is blackened when all its adjacent nodes have been examined (also called the node is finished). Depth-first search generates a depth-first forest. During the search, each node is also time stamped. There are two time stamps: attribute dtime records when the node is first discovered (and grayed), and attribute ftime records when the search finishes examining all output arcs of the node. Attribute parent refers to the parent of the node in the search tree.Class OGraphArcWhen an enabled binding element fires, the state of the CPNet transfers from one marking (denoted by attribute source) to another marking (denoted by attribute target). An object of class OGraphArc represents the transferring between two reachable markings.Class OGraphAttribute nodes represent the finite set of nodes of the occurrence graph. Attribute net refers to the CPNet the occurrence graph belongs to.Operation DFS_Visit(root) performs a depth-first search visit starting from OGraphNode root. Operation isReachable (node1, node2) checks if the marking corresponding to node2 is reachable from the marking corresponding to node1. Operation isHome(home) examines if home represents a home marking.3.CPNET OCCURRENCE GRAPHWe have already indicated the importance of state-based formal reasoning, which is supported by state space methods. Most state space methods investigate the reachable states by constructing an occurrence graph (also known as reachability graph, O-graph for short). Basically an O-graph is a directed graph consisting of all the states the system can reach from its given initial state. Each node of the graph represents a state of the system, and each directed arc is labeled with the action that leads to the next state. An O-graph provides an interleaving semantics of a system: two or more actions occurring simultaneously are treated as an un-ordered sequence. Readers who are interested in the formal definition of O-graph are referred to [Jensen v2].Now we discuss O-graph construction algorithm, which is the key to the state space method using CPNet. When we have a CPNet where all variables (in the arc expressions and transition guards) have finite color sets, the O-graph is finite iff (if and only if) all places are bounded. Below we recapture the abstract algorithm to construct the O-graph given in [Jensen v2]. The algorithm halts iff the O-graph is finite. Otherwise the algorithm continues for ever, producing a larger and larger subgraph of the O-graph.Waiting := ØNode(M)repeatselect a node M1∈Waitingfor all (b, M2) ∈ Next (M1) dobeginNode(M2)Arc (M1, b, M2)endWaiting := Waiting – {M1}until Waiting = ØFig .2. An abstract O-graph construction algorithmWaiting is a set of nodes. It contains those nodes for which we have not yet found the successor. Node (M) is a procedure that creates a new node M and adds M to Waiting. If M is already a node, the procedure has no effect. Analogously, Arc (M1, b, M2) is a procedure that creates a new arc with source M1, binding element b, and destination M2. If it is already in existence, the procedure has no effect. We use Next (M1) to denote the set of all possible “next moves”: binding element and the next reachable marking from marking M1.Now we present our implementation of the algorithm, which shows a number of additional key points which are not obvious in the abstract algorithm.refer to CPNet.java in JCPNet.Fig. 3a. Get all bindings of a transition, where Set.xproduct is listed in Fig. 3b.Fig. 3b. Set.xproduct4.EXAMPLE APPLICATIONSWe present five example applications in this section. “Arithmetic Adder” is a simple example showing data manipulation in CPNets. “Dining philosophers” and “Distributed database” have also been discussed and analyzed in [Jensen v1] and [Jensen v2], here we use them to test the correctness of our implementation of CPNet O-graph construction algorithm. “Resource allocation” is a classical problem in operating system, which is used to illustrate how JCPNet can be used to detect deadlocks automatically. JCPNet has also been applied intensively in the specification, design and analysis of service-oriented distributed systems.JCPNet has several advantages over CPN tools: (1) the content of each node in an O-graph can befound more conveniently, while in CPN tools you have to write a lot of state space queries; (2) theO-graph can be generated automatically in the input format of GraphViz [GraphViz] for visualization; (3) JCPNet also enables CPNet modelers to utilize CPNet algorithms as Java APIs rather than solely relying on external tools.4.1Arithmetic AdderFig. 4 shows a simple example which illustrates data manipulation in CPNet.Declaration:Color INT = int;var x, y, z: INT;fun sum(i, j , k) = i + j + k;Fig. 4. CPNet model of an arithmetic adder4.2Dining PhilosophersDining philosophers is a classical problem of concurrency and conflicts, which are captured in the CPNet model in Fig. 5. The model is implemented by DiningPhilosophers.java in JCPNet.Declarations:val n = 5;color PH = index ph with 1..n;color CS = index cs with 1..n;var p: PH;fun Chopsticks(ph(i)) = 1`cs(i) ++ 1`cs(if i=n then 1 else i+1);Fig. 5. CPNet model of dining philosophers4.3Distributed DatabaseFig. 6 shows the CPNet model of a distributed database where data replication is enabled and data consistency is enforced. The model is implemented by DistributedDB.java in JCPNet.Declaration:color DBM = index d with 1..n;color PR = product DBM * DBM;fun diff(x,y) = (x<>y);color MES = subset PR by diff ;color E = with e;fun Mes(s) = PR.mult(1`s, DBM.all() – 1`s);var s, r: DBM;Fig. 6. CPNet model of distributed database4.4Resource AllocationThe CPNet model show in Fig. 7 shows the problem of allocating two resources r1 and r2 to two processes P1 and P2, only one resource is allowed to be allocated to a process at a time, and the two resources are allocated to each process in different order. This allocation scheme leads to one deadlock, which has been detected automatically by the state space analysis reported in Fig. 8. The model is implemented by ResourceAllocation.java in JCPNet.Declaration:color E = with e;Fig. 7. CPNet model of resource allocation scheme A### The Ocurrence Graph of CPNet Resource Allocation has 6 nodesNode # 1 with marking:Content of marking:p11 : ep21 : eResource1 : eResource2 : e--------------------------------------Input Arcs:BE = [work1, [e]]FROM Node # 4BE = [work2, [e]]FROM Node # 6Output Arcs:BE = [allocateR1ToP1, [e]]TO Node # 2BE = [allocateR2ToP2, [e]]TO Node # 3Node # 2 with marking:Content of marking:p12 : ep21 : eResource2 : e--------------------------------------Input Arcs:BE = [allocateR1ToP1, [e]]FROM Node # 1Output Arcs:BE = [allocateR2ToP1, [e]]TO Node # 4BE = [allocateR2ToP2, [e]]TO Node # 5Node # 3 with marking:Content of marking:p11 : ep22 : eResource1 : e--------------------------------------Input Arcs:BE = [allocateR2ToP2, [e]]FROM Node # 1Output Arcs:BE = [allocateR1ToP1, [e]]TO Node # 5BE = [allocateR1ToP2, [e]]TO Node # 6Node # 4 with marking:Content of marking:p13 : ep21 : e--------------------------------------Input Arcs:BE = [allocateR2ToP1, [e]]FROM Node # 2Output Arcs:BE = [work1, [e]]TO Node # 1###Node 5 is a TERMINAL node ###Node # 5 with marking:Content of marking:p12 : ep22 : e--------------------------------------Input Arcs:BE = [allocateR2ToP2, [e]]FROM Node # 2BE = [allocateR1ToP1, [e]]FROM Node # 3Output Arcs:Node # 6 with marking:Content of marking:p11 : ep23 : e--------------------------------------Input Arcs:BE = [allocateR1ToP2, [e]]FROM Node # 3Output Arcs:BE = [work2, [e]]TO Node # 1### number of DEAD markings (TERMINAL nodes) = 1Fig. 8. Occurrence graph of the CPNet model for resource allocation.Node #5 indicates a deadlock which occurs when resource r2 has beenallocated to process P1 and resource r1 has been allocated to process P2.The deadlock can be avoided by (1) allocate all resources to a process at the same time (shown in Fig. 8); or (2) allocate one resource to a process at a time, but allocate the resources to each process in the same order (shown in Fig. 9).Fig. 8. Allocate all resources at the same time to a process. No deadlocks.Fig. 9. Allocate resources (one resource to one process at a time) inthe same other to each process. No deadlocks.4.5Service Oriented Distributed SystemsA subclass of CPNet, WSPNet, has been created as the unified specification model for service compositions and behavioral interface (conversation protocols). WSPNet supports incoroporation of stateful partners, verification of service compositions, derivation of behavioral interfaces, and verification of application-level protocol involving services [Yi icws][atpn report][protocol verification].5.CONCLUSION AND FUTURE DIRECTIONSIn this paper we have presented a new software tool JCPNet supporting CPNet, which has a potential to enable CPNet model to be used more widely and flexibly. An overview of the implementation of JCPNet is given, which highlights the key points of our implementation. Moreover, CPNet model and JCPNet tool are applied to a number of examples including specification and analysis of service oriented distributed systems.In the future, we plan to add more advanced features to JCPNet, such as automatically importing CPNet from CPN tools, and alleviating the state space explosion problem [State explosion][Sweep-line] [Incremental state space].REFERENCES[Intro to MDA]An introduction to Model Driven Architecture. http://www-/developerworks/rational/library/3100.html[Yi dasd] X. Yi and Krys J. Kochut."Process Composition of Web Services with Complex Conversation Protocols: a Colored Petri Nets Based Approach", Proceedings of the Design, Analysis, and Simulation of Distributed Systems Symposium, pp. 141-148, Adavanced Simulation Technology Conference 2004, April 2004, Washington DC[Yi icws] X. Yi and Krys J. Kochut."A CP-nets-based Design and Verification Framework for Web Services Composition", Proceedings of 2004 IEEE International Conference on Web Services, pp. 756-760, July 2004, San Diego, California[JCPNet website]JCPNet: A Java Colored Petri Nets Modeling and Analysis Tool./~xyi/jcpnet.html[Jensen v1, v2, v3] K. Jensen. Colored Petri Nets Basic Concepts, Analysis Methods and Practical Use, Volume 1, 2, 3 second edition, 1996[Incremental state space] Glen Lewis, C. Lakos. Incremental State Space Construction for Coloured Petri Nets. ICATPN 2001, LNCS 2075, pp. 263-282, 2001[CPN practitioner’s guide] L.M. Kristensen, S. Christensen, K. Jensen: The Practitioner's Guide to Coloured Petri Nets. International Journal on Software Tools for Technology Transfer, 2 (1998), Springer Verlag, 98-132.[CPNet and sys dev] Lars M. Kristensen, Jens B. Jorgensen, and Kurt Jensen. Application of Coloured Petri Nets in System Development. In Lecture on Concurrency and Petri Nets, Jorg Desel, Wolfgang Reisig and Grezegorz Rozenberg (Eds.), Springer, LNCS 3089, 626-685.[Algorithm text] T. Cormen, C. Leiserson, R. Rivest, C. Stein. 2001. Introduction to Algorithms. Second edition. MIT Press.[atpn report ] X. Yi and Krys J. Kochut,"Specification and Analysis of Service-Oriented Distributed Systems using Colored Petri Nets: Algorithms and Tools", UGA computer science department technical report, Nov. 2004. /~xyi/atpnTR.pdf[SML] Standard ML’97. /sml97.html[GraphViz] Graphviz - Graph Visualization Software /[Sweep-line method] Thomas Mailund, and Michael Westergaard. Obtaining Memory-Efficient Reachability Graph Representations Using the Sweep-Line Method. LNCS 2988. Springer-Verlag, 2004.[State explosion problem] A. Valmari. The State Explosion Problem. In Lectures on Petri Nets I: Basic Models, volume 1491 of Lecture Notes in Computer Science, pages 429–528. Springer-Verlag, 1998.。

相关文档
最新文档